Analysis
-
max time kernel
295s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 09:16
General
-
Target
Uni.exe
-
Size
409KB
-
MD5
78f15f52152da9355915d646d5f4f1e6
-
SHA1
514623af0d40968570977bb0993bc775b5dcb6cb
-
SHA256
6526c22d7ce386857149b6b5615c1c24cab7691496a1d3d849ead5d3e0b7b0c7
-
SHA512
13752ce045c2f7f0be187a6688b4032579fce7f17e8b77f66f192ee472aa58e60a1c5ea34dd85cb704e621afe4f228df880536159a7a907c41fbfeba3180a87d
-
SSDEEP
12288:ypbJjGukXuXQiwWlaJKwuKOASp2uLBUS:2VauOWERPIpB
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
PXEHWy52mqnqS2Hd39SK
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2364-1-0x0000000000050000-0x00000000000BC000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Executes dropped EXE 2 IoCs
Processes:
Client.exe1K57BfqeICMh.exepid process 1652 Client.exe 3780 1K57BfqeICMh.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 ip-api.com -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3944 3780 WerFault.exe 1K57BfqeICMh.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeSCHTASKS.exeschtasks.exepid process 3200 schtasks.exe 3880 SCHTASKS.exe 2664 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Uni.exeClient.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 2364 Uni.exe Token: SeDebugPrivilege 1652 Client.exe Token: 33 4812 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4812 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Client.exe1K57BfqeICMh.exepid process 1652 Client.exe 3780 1K57BfqeICMh.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Uni.exeClient.exedescription pid process target process PID 2364 wrote to memory of 3200 2364 Uni.exe schtasks.exe PID 2364 wrote to memory of 3200 2364 Uni.exe schtasks.exe PID 2364 wrote to memory of 3200 2364 Uni.exe schtasks.exe PID 2364 wrote to memory of 1652 2364 Uni.exe Client.exe PID 2364 wrote to memory of 1652 2364 Uni.exe Client.exe PID 2364 wrote to memory of 1652 2364 Uni.exe Client.exe PID 2364 wrote to memory of 3880 2364 Uni.exe SCHTASKS.exe PID 2364 wrote to memory of 3880 2364 Uni.exe SCHTASKS.exe PID 2364 wrote to memory of 3880 2364 Uni.exe SCHTASKS.exe PID 1652 wrote to memory of 2664 1652 Client.exe schtasks.exe PID 1652 wrote to memory of 2664 1652 Client.exe schtasks.exe PID 1652 wrote to memory of 2664 1652 Client.exe schtasks.exe PID 1652 wrote to memory of 3780 1652 Client.exe 1K57BfqeICMh.exe PID 1652 wrote to memory of 3780 1652 Client.exe 1K57BfqeICMh.exe PID 1652 wrote to memory of 3780 1652 Client.exe 1K57BfqeICMh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uni.exe"C:\Users\Admin\AppData\Local\Temp\Uni.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Uni.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\1K57BfqeICMh.exe"C:\Users\Admin\AppData\Local\Temp\1K57BfqeICMh.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 17124⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\Uni.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1300,i,18168883380598738769,14202261231630113808,262144 --variations-seed-version --mojo-platform-channel-handle=4240 /prefetch:81⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2c0 0x3c81⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3780 -ip 37801⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1K57BfqeICMh.exeFilesize
276KB
MD5120f3a38b2f4eb0f800ebe47ffa5e76b
SHA1bed5148cc6a53e12a86ed635bb79135a568edd78
SHA2563a195d762fd1e2f7f93eb4cbcef8fa9b600a6f94fc43b1c1c157b2c5e069154f
SHA51260e66274203624afa422578d9807b21cbcc99de855dd665aa54753c957886677e358a2579ade098970c7ea3f9c3f2476c9e028fdabaac6ee991f09093fa52aff
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD578f15f52152da9355915d646d5f4f1e6
SHA1514623af0d40968570977bb0993bc775b5dcb6cb
SHA2566526c22d7ce386857149b6b5615c1c24cab7691496a1d3d849ead5d3e0b7b0c7
SHA51213752ce045c2f7f0be187a6688b4032579fce7f17e8b77f66f192ee472aa58e60a1c5ea34dd85cb704e621afe4f228df880536159a7a907c41fbfeba3180a87d
-
memory/1652-18-0x00000000066C0000-0x00000000066CA000-memory.dmpFilesize
40KB
-
memory/1652-13-0x00000000750A0000-0x0000000075850000-memory.dmpFilesize
7.7MB
-
memory/1652-20-0x00000000750A0000-0x0000000075850000-memory.dmpFilesize
7.7MB
-
memory/1652-19-0x00000000750A0000-0x0000000075850000-memory.dmpFilesize
7.7MB
-
memory/1652-14-0x00000000750A0000-0x0000000075850000-memory.dmpFilesize
7.7MB
-
memory/2364-6-0x00000000057E0000-0x00000000057F2000-memory.dmpFilesize
72KB
-
memory/2364-2-0x0000000004FF0000-0x0000000005594000-memory.dmpFilesize
5.6MB
-
memory/2364-7-0x0000000005D20000-0x0000000005D5C000-memory.dmpFilesize
240KB
-
memory/2364-3-0x0000000004B70000-0x0000000004C02000-memory.dmpFilesize
584KB
-
memory/2364-16-0x00000000750A0000-0x0000000075850000-memory.dmpFilesize
7.7MB
-
memory/2364-0-0x00000000750AE000-0x00000000750AF000-memory.dmpFilesize
4KB
-
memory/2364-5-0x0000000004AC0000-0x0000000004B26000-memory.dmpFilesize
408KB
-
memory/2364-4-0x00000000750A0000-0x0000000075850000-memory.dmpFilesize
7.7MB
-
memory/2364-1-0x0000000000050000-0x00000000000BC000-memory.dmpFilesize
432KB